Skip to main content

Help us improve the Digital Marketplace - send your feedback

VESPER SOFTWARE LTD

Snapshot Reviews

Snapshot Reviews is an engineering team performance assessment platform that leverages real-time productivity data to facilitate strategic decision-making.

Features

  • Continuous Feedback
  • Platform Integrations
  • Insights
  • Employee Development
  • Goal Management
  • 360 Reviews
  • AI Powered Feedback

Benefits

  • Continuous Feedback: Sprint Retrospectives, Automated Cycles
  • Integrations: Slack, Jira, GitHub, Google Workspace
  • Insights: Data-Driven Performance, Real-Time Data, Precise Insights
  • Employee Development: Daily/Weekly Checkins, Data-Driven Performance Assessment
  • Goal Management: Company & Employee Goal Alignment, SMART Goals
  • 360 Reviews: Customizable Reviews, Automated Cycles
  • AI-Powered Feedback: Line-by-line code suggestion, AI Powered Code Review

Pricing

£4 to £20 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at kirim@vesper.limited. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 2 1 7 6 2 5 5 3 7 5 1 0 9 3

Contact

VESPER SOFTWARE LTD Ahmet Kirimgeray Kirimli
Telephone: +44 7534 567864
Email: kirim@vesper.limited

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Constant maintenance and system updates are provided regularly. During those times system users will be notified in advance and maintenance hours will be selected from using non-peak hours.
System requirements
Internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 to 48 hours or less depending on ticket status.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
No
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Recruitment of Assistive Technology Users
Accessibility Evaluation
Functional Testing
Compatibility Testing
Usability Testing
Feedback Collection
Iterative Improvement
Regression Testing
Onsite support
Yes, at extra cost
Support levels
At the "Perform Plan" we offer email support and knowledge base for support purposes.
At the "Develop Plan" we offer everything in perform plan and also provide live chat support.
At the "Report Plan" we offer everything in develop plan and also provide a dedicated support specialist.
We don't charge anything extra for our support services they are part of our subscription plans.
For large organizations and valued customers we also provide an account manager. This is a custom priced service and pricing depends on the plan our customer subscribes to and the size of their organization.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We offer comprehensive online onboarding solutions and extensive documentation tailored to streamline your onboarding process.

Our platform provides intuitive documentation and seamless procedures to ensure a smooth transition for new hires. From digital forms to interactive training modules, we've got you covered every step of the way.

Our account and success manager also provide online trainings and guide our partners during the whole onboarding process.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
With our platform, users have the flexibility to extract their data in various formats, such as Excel, once their contract ends, provided they are on the appropriate plan that allows data extraction. Alternatively, if users are not on such a plan, they can still access their data through our portal but won't have the option to extract it.

Furthermore, users have the choice to either have their data deleted immediately upon contract termination or retained for future use upon their return, based on their preference. Rest assured, any personal data will be promptly deleted if the user chooses this option, ensuring compliance with privacy regulations and maintaining data security.
End-of-contract process
At the conclusion of the contract, there will be no additional costs incurred beyond the fees that have already been agreed upon. This means that users can expect transparency and clarity regarding their financial obligations, with no unexpected charges upon termination.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There aren't any outstanding differences; our system works perfectly fine on both mobile and desktop devices
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Our UI is intuitive and user-friendly, boasting a clean, modern design with a minimalist aesthetic to reduce clutter. A navigation bar grants easy access to main sections like Home, Profile, Settings, and Help, each represented by recognizable icons and descriptive text. The main content area features distinct sections, organized with a clear visual hierarchy using cards, grids, or lists. Interactive elements are designed for usability, with ample padding and clear affordances. Accessibility is paramount, with integration of accessibility standart, keyboard navigation, and semantic HTML. Our iterative improvements ensure a responsive interface for all users.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
User Recruitment: We reached out to individuals using assistive technologies such as screen readers, magnifiers, and voice recognition software. We ensured diversity in participants, representing various disabilities and assistive tech setups.
Accessibility Evaluation: We assessed the service interface against standards like WCAG. We checked for keyboard accessibility, semantic HTML, color contrast, and compatibility with screen readers.
Functional Testing: We tested core functionalities using assistive technologies. We ensured accessibility and intuitive usage, including navigating, form filling, and interacting with dynamic elements.
Compatibility Testing: We verified interface functionality across different assistive tech setups, browsers, and OSs commonly used by individuals with disabilities.
Usability Testing: We conducted sessions with assistive tech users to gather feedback on their experience. We observed ease of task completion, navigation, and content understanding.
Feedback Collection: We encouraged users to provide insights on accessibility barriers, usability issues, and suggestions for improvements.
Iterative Improvement: We used collected feedback to enhance accessibility and usability continuously.
Documentation and Training: We documented findings and integrated them into design guidelines and training materials, ensuring accessibility considerations are part of the development process.
API
No
Customisation available
Yes
Description of customisation
Users can customize our service to tailor it to their specific preferences and needs. Here’s how:
What can be customized: Users can personalize various aspects of their experience, including:
Dashboard layout and widgets
Theme or color scheme
Notification preferences
Language settings
Privacy and security settings
How users can customize: Customization options are easily accessible within the user settings or preferences section of the service. Users can navigate to these settings and make adjustments using intuitive controls and menus. For example, they can drag and drop fields on the dashboard to rearrange them, select their preferred theme , or toggle notification settings on or off.
Who can customize: Any registered user under applicable plan of our service can customize their experience according to their preferences. Whether they’re accessing the service on a desktop computer, tablet, or mobile device, customization options are available to all users to enhance their usability and personalization.

Scaling

Independence of resources
To ensure users aren't impacted by demand fluctuations, we maintain a scalable infrastructure with load balancing and resource allocation. Real-time performance monitoring and proactive optimization mitigate bottlenecks. Capacity planning anticipates growth, while failover and redundancy ensure uninterrupted service. Isolating resources prevents individual users from affecting others. Transparent communication keeps users informed of system status and potential impacts. These strategies, combined, guarantee a consistent and reliable user experience, irrespective of demand variations.

Analytics

Service usage metrics
Yes
Metrics types
Response Time
Resolution Time
First Contact Resolution (FCR) Rate:
Average Handling Time
Service Uptime and Reliability
Average Use Time

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users navigate to the related section within the system.
Upon selecting the export data option, users are presented with data export options.
Users can choose the specific data they want to export, such as performance reviews, goals, metrics, etc.
Users are provided with multiple export format options, such as XLSX, CSV, PDF, and file formats.
They select the desired format.
After specifying the data to export and the desired format, users initiate the export process.
The system then generates the requested data in the chosen format.
Once the process is complete, users can then access the exported data.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XLSX
  • PDF
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • API integration with Jira
  • API integration with GitHub

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee a high level of availability for our service, striving for uptime that exceeds industry standards. Our service level agreements (SLAs) typically outline a minimum guaranteed level of availability, often expressed as a percentage of uptime over a specified period, such as monthly or annually.

Along with the support of our partner, we guarantee 99% uptime, meaning our service should be available and operational 99% of the time within a given month. If we fail to meet this guaranteed level of availability, users may be eligible for refunds or service credits.
Approach to resilience
The service we use prioritizes resilience, featuring redundant infrastructure and failover mechanisms to uphold high availability. Within the datacenters we utilize -along with the support from our partners- we deploy redundant power supplies, network connections, and hardware components to mitigate single points of failure. Automated backup and disaster recovery processes further safeguard data integrity, ensuring uninterrupted service continuity. Routine testing and audits to validate the effectiveness of our resilience measures frequently take place, continuously refining resilience approachs to meet evolving demands.
Outage reporting
Our service is committed to keeping users informed about any outages promptly and effectively. We achieve this through email alerts, ensuring that users receive timely notifications regarding the status of our service. These email alerts provide comprehensive details about the nature of the outage, including expected resolution times and any relevant updates. By prioritizing transparent communication via email alerts, we empower users to stay informed and take necessary actions in response to disruptions in service availability. This proactive approach to reporting outages underscores our dedication to providing a reliable and transparent service experience for our users.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is restricted using role-based access control (RBAC), which limits access to authorized personnel based on their roles. Privileged access management (PAM) controls and monitors access to critical systems. Access logging and monitoring track user activities, and regular access reviews ensure permissions align with security policies. These measures collectively safeguard sensitive data and maintain the security of our systems.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials +
Information security policies and processes
Our information security policies and processes are designed to safeguard sensitive data and mitigate risks effectively. We adhere to industry best practices and standards, such as Cyber Essentials +, to establish a robust framework for information security management. Our policies cover areas such as data confidentiality, integrity, and availability, as well as access control, incident response, and compliance.

We enforce these policies through a comprehensive reporting structure that includes designated security officers and a dedicated security team. Regular security audits, vulnerability assessments, and penetration testing are conducted to identify and address potential security vulnerabilities proactively.

To ensure compliance with our security policies, we employ a combination of technical controls, such as access controls and encryption, as well as ongoing training and awareness programs for employees. Regular monitoring and auditing of system logs and user activities help detect and mitigate any deviations from established policies. Additionally, incident response procedures are in place to address security incidents promptly and effectively, with post-incident reviews conducted to identify areas for improvement and reinforce adherence to policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes entail meticulous tracking of service components via a centralized database. Proposed changes undergo rigorous assessment for potential security impacts, employing a risk-based approach. Risks are analyzed, and mitigation measures are implemented to address vulnerabilities. Thorough testing and validation precede production implementation. Clear documentation and communication channels ensure stakeholders are informed. Continuous monitoring post-implementation detects any security issues, enabling prompt remediation. This approach ensures the integrity and security of our services while facilitating agile adaptation to evolving business requirements.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process involves continuous assessment of potential threats to our services. We employ automated scanning tools and manual analysis to identify vulnerabilities. Upon detection, patches are swiftly deployed following a risk-based prioritization strategy. We source threat intelligence from reputable sources such as security advisories, industry reports, and security forums, enabling proactive mitigation of emerging threats. This proactive approach ensures timely identification and remediation of vulnerabilities, enhancing the security posture of our services.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring processes swiftly identify potential compromises through real-time monitoring of system logs, network traffic, and anomalous behavior patterns. Upon detection of a potential compromise, our incident response team initiates immediate investigation and containment measures to mitigate the impact. Response times are prioritized based on the severity of the incident, with critical incidents addressed within minutes. Our proactive approach ensures rapid detection and response to security threats, minimizing the risk of data breaches or service disruptions. Continuous monitoring and analysis further enhance our ability to safeguard against evolving threats.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management processes are structured to ensure swift and effective resolution of all types of incidents. Pre-defined processes for common events streamline response efforts, enabling quick containment and resolution. Users report incidents through multiple channels, including email, a dedicated support portal, or phone. Upon receipt of an incident report, our incident response team initiates immediate investigation and response actions. Incident reports are provided to users through email notifications or accessible through our support portal, detailing the incident's nature, impact, and resolution steps taken. Regular updates are communicated until full resolution, ensuring transparency and accountability throughout the incident lifecycle.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our approach is committed to fighting climate change by prioritizing sustainability and environmental responsibility in all aspects of our operations. Here's how we contribute to this important cause:

Carbon Footprint Reduction: We prioritize energy efficiency and carbon footprint reduction in our infrastructure. By leveraging efficient hardware, optimizing resource utilization, and adopting renewable energy sources where feasible, we minimize our environmental impact and contribute to reducing greenhouse gas emissions.
Green Procurement Practices: We promote green procurement practices by sourcing eco-friendly products and services, prioritizing suppliers with strong environmental credentials and sustainability initiatives. By choosing environmentally responsible vendors and partners, we encourage sustainable practices throughout our supply chain.
Remote Work and Telecommuting: Our service encourages remote work and telecommuting, reducing the need for travel and commuting, which in turn lowers carbon emissions associated with transportation. By providing flexible work arrangements and supporting remote collaboration tools, we enable our employees and clients to reduce their carbon footprint.
Environmental Awareness and Education: We promote environmental awareness and education among our employees, clients, and stakeholders. By raising awareness about climate change and sustainability issues, we empower individuals and organizations to make informed choices and take proactive steps to mitigate their environmental impact.
Supporting Green Initiatives: We actively support and participate in green initiatives and community projects aimed at addressing climate change and promoting sustainability. Whether through financial contributions, volunteerism, or partnerships with environmental organizations, we strive to make a positive impact on our planet and contribute to a more sustainable future.
Overall, our commitment to fighting climate change extends beyond our strategy; it is ingrained in our corporate culture and values. By prioritizing sustainability and environmental responsibility, we aim to drive meaningful change and create a better world for future generations.

Covid-19 recovery

In response to the COVID-19 pandemic, we supportedrecovery efforts and addressing the challenges posed by the crisis. Here's how we contribute to COVID-19 recovery:

Remote Work Enablement: Our services facilitate remote work and collaboration, helping organizations adapt to remote work requirements during lockdowns and restrictions. By providing secure and reliable communication and collaboration tools, we enable seamless remote work operations, ensuring business continuity and productivity despite physical distancing measures.
Healthcare Support Solutions: We offer solutions tailored to support healthcare organizations and frontline workers in their response to the pandemic. This include platforms, remote monitoring systems, or data analytics tools.
Community Support Initiatives: We actively participate in community support initiatives and contribute to COVID-19 relief efforts. These involve donating resources, offering discounted or free services to organizations directly involved in pandemic response efforts, or volunteering time and expertise to support community organizations and vulnerable populations affected by the crisis.
Digital Transformation: We assist organizations in accelerating their digital transformation initiatives to adapt to the new normal brought about by the pandemic. This involve migrating legacy systems to cloud-based platforms, implementing digital workflow automation solutions, or enhancing cybersecurity measures to secure remote work environments.
By supporting COVID-19 recovery efforts through remote work enablement, healthcare solutions, community support, data analytics, and digital transformation, our Snapshot Reviews system plays a vital role in building resilience for the future.

Tackling economic inequality

Our service provision contributes to tackling economic inequality by empowering organizations to optimize their performance management processes, thereby fostering a fair and inclusive work environment. Here's how we address economic inequality:

Equal Opportunity: Our performance management software provides a transparent and merit-based approach to evaluating employee performance, ensuring equal opportunity for all employees regardless of background or demographics. By eliminating bias and promoting fairness in performance assessments, we help organizations create a level playing field for career advancement and recognition.
Skill Development and Career Growth: Our software supports employee skill development and career growth initiatives, enabling individuals to enhance their skills, knowledge, and capabilities. By providing access to training resources, personalized development plans, and performance feedback, we empower employees to overcome barriers to advancement and achieve their full potential, regardless of socio-economic background.
Data-Driven Decision-Making: Our software offers data analytics and insights that enable organizations to identify and address disparities in performance, compensation, and opportunities for advancement. By leveraging data-driven insights, organizations can implement targeted interventions and policies to promote inclusivity, diversity, and economic equity within the workforce.
Accessibility and Affordability: We offer flexible pricing models and scalable solutions that cater to organizations of all sizes and budgets, including small and medium-sized enterprises (SMEs) and non-profit organizations. By making our software accessible and affordable, we ensure that economic constraints do not hinder organizations from implementing effective performance management practices that promote equality and fairness in the workplace.
Community Engagement: We actively engage with communities and organizations that are working to address economic inequality and promote social mobility.
Through these efforts, our software contributes to tackling economic inequality by promoting equal opportunity, skill development, data-driven decision-making, accessibility, and community engagement. By empowering organizations to create inclusive and fair workplaces, we help build a more equitable society.

Equal opportunity

Our service provision actively promotes equal opportunity in the workplace through our performance management. Here's how we contribute to fostering equal opportunity:

Merit-Based Evaluation: Our software enables organizations to conduct performance evaluations based on objective criteria and merit, rather than subjective biases. This ensures that all employees have an equal opportunity to showcase their skills, accomplishments, and contributions.
Bias Mitigation: We incorporate features into our software to mitigate unconscious biases in performance evaluations. This includes anonymizing feedback, implementing standardized evaluation criteria, and providing training on unconscious bias awareness to managers and evaluators.
Accessibility and Inclusivity: Our software is designed with accessibility in mind, ensuring that all employees, including those with disabilities or diverse backgrounds, can fully participate in performance management activities. We provide customizable interfaces, support for assistive technologies, and multi-language capabilities to accommodate diverse user needs and preferences.
Diversity and Inclusion Analytics: Our software offers data analytics capabilities that enable organizations to track and analyze diversity metrics, such as representation across demographic groups, pay equity, and promotion rates. This helps organizations identify areas for improvement and implement targeted initiatives to foster equal opportunity for all employees.
Training and Development Support: We offer features within our software to support employee training, development, and career advancement opportunities. This empowers employees to enhance their capabilities and pursue growth opportunities, regardless of their background or demographic characteristics.
Through these efforts, we promote equal opportunity by fostering fair and inclusive workplaces where all employees have the chance to succeed based on their abilities and contributions, regardless of factors such as gender, race, ethnicity, or socio-economic status.

Wellbeing

Ou provision prioritizes employee wellbeing through our software's capabilities. Here's how we contribute to fostering wellbeing:

Work-Life Balance: Our software supports flexible work arrangements and remote collaboration, enabling employees to achieve a better work-life balance. By facilitating remote work and providing tools for efficient task management, we help reduce stress and burnout associated with long commutes and rigid work schedules.
Feedback and Recognition: Our software facilitates regular feedback and recognition, fostering a culture of appreciation and positivity in the workplace. Recognizing employees' achievements and contributions boosts morale and enhances job satisfaction, contributing to overall wellbeing.
Goal Setting and Progress Tracking: Our software enables employees to set personal and professional goals, track their progress, and celebrate milestones. This sense of purpose and achievement contributes to greater job satisfaction and overall wellbeing.
Through these efforts, our performance management software promotes employee wellbeing by supporting work-life balance, feedback and recognition, goal setting and progress tracking, and analytics. By prioritizing employee wellbeing, we help create a positive and supportive work environment where employees can thrive and perform at their best.

Pricing

Price
£4 to £20 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Our two-week free trial offers an extensive array of features. Included are performance reviews, goal management tools, and essential core platform functionalities. This trial period allows users to experience our platform firsthand, with no commitment required. However, advanced features such as AI-powered insightsi and advanced dev-team management are not included.
Link to free trial
https://www.snapshot.reviews/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at kirim@vesper.limited. Tell them what format you need. It will help if you say what assistive technology you use.